Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security. This book travels layer by... Læs mere
Bemærk: Kan ikke leveres før jul.
Offers a formal framework for finding and eliminating network security threats. This title focuses on the steps necessary to manage an assessment, including... Læs mere
Bemærk: Kan ikke leveres før jul.
Taking a process-focused approach, this book presents a methodology, an understanding of business goals and processes and how security measures are aligned with... Læs mere
Bemærk: Kan ikke leveres før jul.
Presents an information on analyzing, designing, and implementing various aspects of computer network security. This book helps CIOs,... Læs mere
Bemærk: Kan ikke leveres før jul.
Integrates the importance of sound security policy with the strategic goals of an organization. This book offers an insight into the issues surrounding the goals of protecting valuable information assets.
Bemærk: Kan ikke leveres før jul.
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. Disruptive... Læs mere
Bemærk: Kan ikke leveres før jul.
A guide to the CISSP-ISSEP CBK. It promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE), Certification and Accreditation, Technical Management, and an Introduction to United States Government Information Assurance Regulations.
Bemærk: Kan ikke leveres før jul.
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. This handbook... Læs mere
Bemærk: Kan ikke leveres før jul.
Presents an overview of wireless network security. This book examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. It... Læs mere
Bemærk: Kan ikke leveres før jul.
The idea of actively using the power of quantum mechanical principles and special entangled states has fueled a revolution in the computing and communications... Læs mere
Bemærk: Kan ikke leveres før jul.
Defines more than 900 metrics measuring compliance with legislation, resiliency of security controls, and return on investment. This book explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives.
Bemærk: Kan ikke leveres før jul.
This insider’s guide examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to... Læs mere